CVE-2025-51624 – Zone Bitaqati Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-51624 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-46659 – “4C Strategies Exonaut External HTTPS Information Disclosure”
The following table lists the changes that have been made to the CVE-2025-46659 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-45766 – Poco Weak Encryption Vulnerability
The following table lists the changes that have been made to the CVE-2025-45766 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-45764 – jsrsasign RSA Key Encryption Weakness
The following table lists the changes that have been made to the CVE-2025-45764 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-38747 – Dell SupportAssist Elevation of Privileges Vulnerability
The following table lists the changes that have been made to the CVE-2025-38747 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-38746 – Dell SupportAssist OS Recovery Exposure of Sensitive Information to an Unauthorized Actor
The following table lists the changes that have been made to the CVE-2025-38746 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-8130 – Apache Struts Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8130 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-8667 – SkyworkAI DeepResearchAgent OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8667 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-8665 – Agno-agi Agno Os Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8665 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]
CVE-2025-8419 – Keycloak SMTP Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8419 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 06, 2025 Action […]